In August, the Pentagon revealed information about a cyber attack against the US military’s Central Command in 2008. According to the Pentagon’s account, USB memory sticks were randomly placed in a washroom at a US military base in the Middle East providing support for the war in Iraq. The memory sticks, infected with a computer worm by an undisclosed foreign intelligence agency, were picked up by soldiers who ignored protocol and plugged them into military laptops. The worm took 14 months to kill. In a very similar attack earlier this year, Iran experienced a computer worm (the Stuxnet virus) that infected around 30,000 IP addresses, as well as the computers at the Bushehr nuclear plant. The malware, according to international experts, was custom-made to target and manipulate industrial automation software from remote locations. This worm was also apparently spread by a USB memory stick. Some specialists have referred to the malware as an espionage worm, or a malware sleeper cell, because of its ability to immediately infect but remain latent until activated at a later date. It is not impossible that the malware was a US or Israeli (the latter perhaps more probable) cyberwar offensive. Although US President Barack Obama has said that the administration would not monitor private sector networks or internet traffic in the name of cyber security, this clearly cannot be the case with the launch of CYBERCOM, which was undertaken without public debate largely because of the public’s inability to grasp the issue.